|UCSB CRYPTO CONFRENCE - SANTA BARBARIAN|
Keywords: UCSB CRYPTO
|Usenet groups within perl.crypto from giganews.com|
Usenet newsgroups within "perl.crypto", contributed courtesy of giganews.com. These captures omit most binary posts.
|Wiki - Crypto|
Crypto dumped with WikiTeam tools.
Keywords: wiki; wikiteam; MediaWiki; Crypto; editthisinfo_crypto; unknowncopyright
|crypto.stanford.edu 2012-11-30 panic downlaod - crypto.stanford.edu|
This is a panic download of crypto.stanford.edu as of 2012-11-30. This has lot of pdf papers in it that i think should be archived. It also has lot of big files that are repeated a fews times in it.
Keywords: crypto.stanford.edu; archiveteam
|Freepto Rischio - avana|
Keywords: freepto; crypto; usb
|Installing the I2P darknet software in Linux - Adrian Crenshaw|
Installing the I2P darknet software in Linux
Keywords: privacy; crypto; cipherspace
|Protecting your Facebook privacy at work isn't just about passwords - Cory Doctorow|
Here's a podcast of my last Guardian column, Protecting your Facebook privacy at work isn't just about passwords: Facebook has threatened to sue companies that force their employees to reveal their Facebook login details. As laudable as this is, I worry that it will fail to accomplish its primary objective â protecting Facebook users from employer snooping. Increasingly, firms configure the computers and devices on their internal networks to trust "self-signed certificates"...
Keywords: podcast; audio; crypto; privacy; corydoctorow
|Usenet groups within alt.sources from giganews.com|
Usenet newsgroups within "alt.sources", contributed courtesy of giganews.com. These captures omit most binary posts.
Keywords: alt.sources.crypto; alt.sources
|Blood Drop (Coagulated Remix) - mirage, Crypto Bass|
Blood Drop (Coagulated Remix)
Keywords: Blood Drop; Coagulated Remix; mirage; Crypto Bass
|Blood Drop (Collagen Remix) - mirage, Crypto Bass|
Blood Drop (Collagen Remix)
Keywords: Blood Drop; Collagen Remix; mirage; Crypto Bass
|Raising User Acceptance of Token-based Authentication by Single Sign-On|
Secure and reliable authentication is one important part in the scope of IT security, but the practical experience shows that adequate authentication mechanisms are often inconvenient for the populace. Password-based mechanisms dominate as they are easy to use and do not need additional hardware. However, lots of users do not realize the threads with respect to password-based mechanisms: many users use passwords for remote authentication over unsecured channels or in not trustworthy environments...
Keywords: authentication; single sign-on; crypto token
|Triton (Retrograde Remix) - mirage, Crypto Bass|
Triton (Retrograde Remix)
Keywords: Triton; Retrograde Remix; mirage; Crypto Bass
|The Counter-Reformation in Stone and Metal: Spiritual Substances - Erik Butler|
Paper given at Black Metal Theory Symposium I: Hideous Gnosis HTTP://BLACKMETALTHEORY.BLOGSPOT.COM
Keywords: black metal; crypto-catholicism; immortal; piteous globe
|In Re Decryption|
Opinion denying forced decryption on 5th Amendment grounds
Keywords: Hanni Fakhoury; decryption; crypto; Fifth Amendment
|Unforgettable Demure (Blackout Remix) - mirage, Crypto Bass|
Unforgettable Demure (Blackout Remix)
Keywords: Unforgettable Demure; Blackout Remix; mirage; Crypto Bass
|Metadata – a wartime drama - Cory Doctorow|
In this week's podcast, I read aloud a recent Guardian column, "Metadata – a wartime drama":http://www.theguardian.com/technology/2013/jul/05/metadata-wartime-drama-privacyWhich imagines a dialog between Alan Turing and Winston Churchill that might have taken place if the UK Home Secretary Theresa May had been Turing's line-manager"All we can tell with this analysis is who is speaking, what equipment they use to speak, whom else they speak to, who the messages are addressed to, the subject of ...
Keywords: podcasts; metadata; spooks; nsa; turing; bletchleypark; crypto
|A Stick Figure Guide to the Advanced Encryption Standard (AES) - Jeff Moser|
A stick figure play in 4 acts describing the history and inner workings of the Advanced Encryption Standard (AES). It goes along with a blog post at http://www.moserware.com/2009/09/stick-figure-guide-to-advanced.html
Keywords: aes; advanced encryption standard; encryption; crypto; cryptography
|Crypto Pilot - http://www.colorpilot.com/cryptopilot.html|
This is a file-encryption program that protects your files and folders from unauthorized access. Just drag and drop files to protect your data. The program enables you to create encrypted data backup, create a key to your file from a floppy or Flash drive, hide some files from co-workers and family members, send encrypted files, and protect your future plans from competitors.
Keywords: Crypto Pilot; System and utilities; File tools; File encryption; Crypto Pilot
|Cryptolog Volume IV Number 6 - National Security Agency|
Features: Human Factors And Systems Design Old Russian Manuscript Ciphers SIGINT Welcomes Inkstand AG-22/IATS: A View From The Bridge Vich ISS R-r- Right? by A.J.S. Letters To The Editor CLA Announcement: Annual Banquet
Keywords: NSA; Cryptolog; declassified; redacted; secret; linguists; june; crypto; secret spoke; crypto log; english sounds; top secret
|Cryptolog Volume XIV Number 2 - National Security Agency|
Features: Thrust Four (U) Bulletin Board (U) Information Management For The Future (U) Food For Thought (U) Modem Communications (U) by Frederick Rodean Letters (U) The Reckoning (U) Some Tips On Getting Promoted, 3rd ed. (U) Contributions Solicited Getting Started Golden Oldie (U) NSA-Crostic No. 64 (U) How Russians View Their Leaders (U)
Keywords: NSA; Cryptolog; declassified; redacted; personnel; promotion; nsa; crypto; personnel summaries; personnel summary; crypto log; promotion files
|Cryptolog Volume IV Number 11 - National Security Agency|
Features: [Redacted] Objective Satisfaction Score: Collection Director's Memorandum: [Redacted] by Vice Admiral B.R. Inman Cure For Time-In-Grade Syndrome A Little T.A. Problem Backing Into Language Acquisition NSA-Crostic No. 10 by A.J.S. How Many African Countries Can You Spot? Language Processing Forum C.A.A. News What Ever Does "However" Mean? Letters To The Editor
Keywords: NSA; Cryptolog; declassified; redacted; unclassified; crypto; november; log; crypto log; top secret; secret spoke; foreign language
|Top Secret Crypto Gold - http://www.topsecretcrypto.com|
This software includes Top Secret Chat and Top Secret Journal, with file and e-mail encryption. It includes spell checking for e-mail, journal, and chatting and uses RSA Public Key Cryptography with the One Time Pad Encryption System. Conduct an encrypted peer-to-peer secure chat over the Internet. Maintain an encrypted journal or diary. The program supports RSA key sizes 480 to 16,384 bits. Insert up to 60 smileys in e-mail, journal entries, and chat sessions...
Keywords: Top Secret Crypto Gold; System and utilities; File tools; File encryption; Top Secret Crypto Gold
|Cryptolog Volume II Numbers 8 and 9 - National Security Agency|
Features: 20 Years Of Transposition Processing [Redacted] Communications The Voynich Manuscript: Third Theory by Doris Miller Typewriter Random: A New Look A Fix For The Language Problem? by John B. Thomas, Jr. Abdul And His 40 Tanks by Frederic O. Mason, Jr. Linguists -- We Need An "Experts Yellow Pages" Letter To The Editor
Keywords: NSA; Cryptolog; declassified; redacted; secret; umbra; crypto; unclassified; top secret; secret umbra; crypto log; subject matter
|MSN Crypto Privacy - http://www.hotdispatch.com/view-ip-requester?ID=16709296|
This plug-in for MSN messenger encrypts your messages as you send them across the network.
Keywords: MSN Crypto Privacy; Internet; Communications; Chat messenger add-ons; MSN; MSN Crypto Privacy
|Wait Until Kingdom Come (Iron Mix) - Crypto Bass, mirage|
Wait Until Kingdom Come (Iron Mix)
Keywords: Wait Until Kingdom Come; Iron Mix; Crypto Bass; mirage
|Acerca de un caso de sinfisoceria asociada a una posible cripto-meiomelia de la antena izquierda en Trox cotodognanensis Compte, 1985 (Coleoptera: Trogidae). - Verdugo, A.|
syphysocre in Trox cotodognanensis
Keywords: Symphysocery; possible crypto-meiomelia; Trox cotodognanensis; DoÃ±ana; Spain
|Have You Embraced the Beast (1998) - TK Major|
Originally recorded and posted to the net in 1998 as part of TK Major's Song of the Day Project, this archive recording has been lovingly remastered to bring it more in line with today's squashed, dynamics-free standards (that's a joke, son) and included here for no good reason except because it amused him.
Keywords: greed, hate, beast, death squad, Reagan, Bush, crypto-fascism
|Wait Until Kingdom Come (Osmium Mix) - mirage, Crypto Bass|
Wait Until Kingdom Come (Osmium Mix)
Keywords: Wait Until Kingdom Come; Osmium Mix; mirage; Crypto Bass
|Cyberpunk Librarian Episode 16 Cypherpunk Librarian - Daniel Messer|
Join Daniel Messer as he goes cypherpunk and talks about keeping yourself secure and private in the online and digital world.
Keywords: crypto; cypherpunk; cyberpunk; librarian; public library; podcast; technology; privacy
|LB #32: The Crypto-Anarchist Manifesto|
An intriguing little publication of sorts I happened to stumble upon. Music courtesy of Badadam's "Drifter."
Keywords: The Crypto-Anarchist Manifesto Badadam Drifter Last Bastille Podcast
|Cryptolog Volume VIII Numbers 1-3 - National Security Agency|
Features: Sigint In The 80s: Two Views (U): I. Robert E. Rich II. William Lutwiniak Kittiwake (U) How To Improve Your Promotion Potential NSA-Crostic No. 32 by D.H.W. Translator In Your Pocket (U) Some Things Never Change (U) NCS-CLA Symposium (U) Why Do They Leave? (U)
Keywords: NSA; Cryptolog; declassified; redacted; language; unclassified; linguists; sigint; crypto; crypto log; top secret; secret handle; career field
|Cryptolog Volume VI Number 10 - National Security Agency|
Features: Snowballs On The Roof (U) by Vera R. Filby Another Source (U) NSA-Crostic No. 29 (U) by DHW The Roads Around Us (U) The 2000- Year-old Transcriber (U) Letter To The Editor (U) Club News (U)
Keywords: NSA; Cryptolog; declassified; redacted; unclassified; nsa; antenna; equipment; crypto; crypto log; cryptologic community; unused property; condition codes
|In Her Own Voice: DoÃ±a Teresa Aguilera y Roche and Intrigue in the Palace of the Governors - New Mexico History Museum, Department of Cultural Affairs|
Dr. Frances Levine's lecture âIn Her Own Voice: DoÃ±a Teresa Aguilera y Roche and Intrigue in the Palace of the Governorsâ. Presented February 20, 2010, as part of the ongoing lecture series accompanying "Santa Fe Found: Fragments of Time: The archaeological and historic roots of Americaâs oldest capital city." New Mexico History Museum Auditorium, Santa Fe, New Mexico.
Keywords: santa fe; new mexico history museum; santa fe found; archaeology; crypto-jews; inquisition; jewish heritage
|CryptoCrat 2004 - http://www.cryptocrat.com/|
This program compresses multiple files into a single, 448-bit encrypted file. It convert data to gibberish, and the original file can only be unscrambled and read by someone who knows the password. The program also supports secure deletion of files from the hard drive. You can create encrypted self-extracting executables to send by e-mail, and the program integrates with the Windows context menu.
Keywords: CryptoCrat 2004; System and utilities; File tools; File encryption; Crypto Crat 2003
The world of Fiat currencies are old, outdated, not enough hard currency moneysupply and mismanaged by its current governments (Currency Wars) and now starting tocause Social unrest, this is only the beginning and trying to get ahead of and prevent thisvery serious situation from getting really out of hand. The world has experienced GlobalFinancial Crisis (2008 -2013), Central Banks disorder = Major Social disorder & unrest...
Keywords: Fiat currencies; Currency Wars; crypto currencies; Central Banks disorder; Social disorder; Global Financial Crisis
|Cryptolog Volume XIV Number 3 - National Security Agency|
Features: On The Constitution Golden Oldie Is Packet Radio Alive And Well On HP? Big Look The Joys Of US Government Travel Bulletin Board A Rope By Any Other Name Ode To Stonehouse CRYSCOM Letters On PC Users' Manuals Sample Pages Of PC Users' Manuals Requirements For A Good Set Of Directions Book Reviews: Her Majesty's Secret Service by Vera Filby Book Reviews: Teleconferencing From The Past NSA-Crostic No...
Keywords: NSA; Cryptolog; declassified; redacted; intelligence; cryscom; confidential; issue; crypto log; north vietnamese; top secret; british intelligence
|Cryptolog Volume V Number 3 - National Security Agency|
Features: Some Background On The C/T Merger by Frank Smith Hand Is Not Quicker Than The Eye A Donkey In Your What? A Linguist Looks At The "Tube" Letters To The Editor An Idea For An Article by Doris E. Miller Word- Seek NSA-Crostic No. 12 by A.J.S. C.L.A. News: C.A.A. News Cure For "Performance Syndrome"
Keywords: NSA; Cryptolog; declassified; redacted; adp; communications; nsa; march; crypto log; top secret; secret spoke; data processing
|Cryptolog Volume XVIII Number 1 - National Security Agency|
Features: GISTER 50 Joint — The Future Of Intelligence? You Bet! Bulletin Board The Digital Dragon Ich Spreche Deutch A Matter Of Compression All You Wanted To Noah About ARC Errata CRYSCO '90 Letters Normalization in re Proforma Crossword Puzzle: Busman's Holiday by RLW Editorial To Contribute
Keywords: NSA; Cryptolog; declassified; redacted; secret; codeword; issue; entry; crypto log; top secret; secret umbra; secret handle
|Cryptolog Volume IV Number 8 - National Security Agency|
Features: What Is An Information Research Analyst? "Dialog" Available At N.S.A. Let Me Repeat And Make Myself Clear by Peter Jenks Postscript To "Dating Game" New Directions In Intelligence Community by David W. Gaddy Early Days In N.S.A. Computing Telling it like it is by Ramon A. Santiago-Ortiz Expletives Deleted? by A.J. Salemme What Are They Up To Anyway? Letters To The Editor
Keywords: NSA; Cryptolog; declassified; redacted; unclassified; nsa; secret; abner; top secret; national security; crypto log; years ago
|Cryptolog Volume XV Number 3 - National Security Agency|
Features: Changes In Agency Reporting SIGINT Reporting Principles Update On Packet Radio Embargoed Information Bulletin Board The Short But Happy Life Of Wideband [Redacted] by N. C. Gerson Language Brief: Xhosa Expo 88 Conference Reports: Mathematics ... Linguistics ... Communications On The Lighter Side Call For Speakers "Leftovers"
Keywords: NSA; Cryptolog; declassified; redacted; fiber; stc; nsa; submarcom; optical fiber; long distance; crypto log; top secret
|Cryptolog Volume X Number 10 - National Security Agency|
Features: Crisis Management: Remarks (U) by Lincoln D. Faurer Soviet Military Goals And Their Effect On Negotiations For Arms Limitations (U) Tips On Topical Reporting (U) Thousands Miss Demonstration (U) Looking Around: Telecom 83 (U) Banners, Cowboy Hats, And ELINT Notations (U)
Keywords: NSA; Cryptolog; declassified; redacted; menwith; military; oct; soviet; menwith hill; task force; crypto log; soviet military
|Cryptolog Volume V Numbers 7 and 8 - National Security Agency|
Features: The Soviet General Staff Has It Ever Been Translated Before? Another Country Trigraph System Is A Translator A Professional? The Bucky Balance Tell Me I'm Just A Sinobibliophobe! NSA-Crostic No. 16 by David H. Williams News Of The Communications Analysis Association I Remember Spellman by A. J. Salemme New Board Members; No More Mispellings [sic] Letters To The Editor by [Redacted] Gurin, [Redacted]
Keywords: NSA; Cryptolog; declassified; redacted; project; translations; translation; nsa; general staff; project starter; armed forces; crypto log
|Cryptolog Volume XIII Numbers 10-11 - National Security Agency|
Features: A New Kind Of Japanese (U) SIREN No. 5 (U) A Summer Language Course (U) On The Lighter Side (U) The Representation Of Prefixes Conference Report (U) by N.C. Gerson Technical Literature Review (U) Software Review (U) Bulletin Board (U) Letters (U) From The Past Results Of Readers' Survey (U) Puzzle (U)
Keywords: NSA; Cryptolog; declassified; redacted; collection; pts; expert; comint; expert system; pts single; personal consultant; crypto log
|Cryptolog Volume II Number 6 - National Security Agency|
Features: Electronic Warfare Advisory Element More On Squaring The Page by Frederic O. Mason Jr. Comsec Familiarization: Do You Need It? Where Does "does" Come From? by Emery Tetrault The Navajo Code Talkers [Redacted] Radiotelephone Crossword by Thomas L. Engle Professionalizing In Computer Systems Project Symbiosis by 016-22-723A Letters To The Editor
Keywords: NSA; Cryptolog; declassified; redacted; nsa; comsec; unclassified; sigint; computer systems; code talkers; crypto log; air force
|Cryptolog Volume IV Number 5 - National Security Agency|
Features: Universes, Galaxies, Etc. (Ugsboc!) by Cecil J. Phillips SIG/IPS Announcement Why Are These People Smiling? by Mary Ann Harrison CLA Banquet Announcement Controversial Book On Artificial Intelligence The Polyhedral War Plain English A Story With A Moral Choose Ye! Letter To The Editor
Keywords: NSA; Cryptolog; declassified; redacted; weizenbaum; unclassified; human; computer; crypto log; computer program; secret handle; human thought
|Cryptolog Volume III Number 1 - National Security Agency|
Features: 63 Days -- The Soviets In Space Football And Cryptology NSA-Crostic No. 2 Lenin And State Prizes: Now You See Them - - Now You Don't! Editor Answers Questions Leo In October by A.I. Murphy
Keywords: NSA; Cryptolog; declassified; redacted; lenin; secret; space; spacecraft; top secret; lenin prize; crypto log; secret umbra
|Cryptolog Volume XIII Numbers 1-2 - National Security Agency|
Features: What I Perceive To Be Happening In The Pacific (U) Diary Of A Geisha (U) Career Opportunity (U) A Case Of Forensic SIGINT (U) CRYSCOM-86 (U) A Morality Play In One Act (U) A Problem In Retrieval (U) Improving Training In Technical ELINT (U) Bulletin Board (U) Letters (U) Puzzle (U)
Keywords: NSA; Cryptolog; declassified; redacted; elint; product; secret; nsa; red works; crypto log; technical elint; secret spoke
|Cryptolog Volume XIII Numbers 8-9 - National Security Agency|
Features: Something New (U) Rum Runners, 1930 (U) Enter Your Passphrase, Please (U) Extended Hours At Learning Center #1 (U) Collection Management (U) Bulletin Board (U) Senior Professional Career Program (U) Back-up Shells For The ASTW (U) Conference Report (U) Book Reviews: Out Of The Inner Circle (U) ... Secrecy, Authentication , And Public Key Systems (U) ... The Computation Of Style (U) ... Italian For Educated Guessers (U) Letters (U) A Private German Cipher Of WWI (U)
Keywords: NSA; Cryptolog; declassified; redacted; user; collection; password; coast; coast guard; collection management; crypto log; computer security
|Cryptolog Volume V Number 6 - National Security Agency|
Features: Bookbreakers Forum On Machine Aids Equipment Maintenance On Abner Golden Oldie: Unknown Location Of U/I Unit Never Again! by Jack Gurin Computer Scratch Pad: At Home Or At Work? by Bill Crowell Minnie's Mini by Minnie M. Kenny NSA-Crostic No. 15 by A.J.S. As I Was Saying Two Years Ago by Mark T. Pattie, Jr Celtic Languages Today Letter To The Editor by E.A. Gilbertson C.A.A. News
Keywords: NSA; Cryptolog; declassified; redacted; celtic; gaelic; unclassified; nsa; top secret; crypto log; celtic languages; secret umbra
|Cryptolog Volume VI Number 7 - National Security Agency|
Features: Source Protection: Our Agency's Insurance Policy (U) Naval Readiness: A Basis For Comparison (U) NSA-Crostic No. 27 (U) by D.H.W. Wilt Thou, Angelina? (U) by Sydney Fairbanks Gears Of The Mouth (U) by Donald Lasley Letters To The Editor (U) Expert (U) Shootout At The SIGINT Corral (U)
Keywords: NSA; Cryptolog; declassified; redacted; sigint; unclassified; naval; submarines; crypto log; language quality; quality control; german naval